Are: > Each node would then try to connect to yahoo a few times each > before it would fall out of the node ref tables. Giving yahoo a > mild DOS attack..
Yeah, it's a way to launch an anonymous DoS attack. The attacker's objective is to reset as many datasources as possible with a minimum of effort. He'd probably actively build a database of popular keys, so he can DataNotFound requests for large files, and immediately fulfill requests for small files. He also wants to maximize the number of hops between him and the request initiator - the more nodes caching his bogus datasource, the better. I can't think of any heuristic to do that at the moment. Anyway... I don't think we can do anything to avert this attack. Sure, other nodes could notice that most of the attacker's datasources are bogus and blacklist him, but we all know Oskar's rule - no negative trust in cyberspace. The attacker can switch to a different address without much interruption. Personally, I'm more concerned with how much routing can be damaged by resetting the datasource to, say, a random node. _______________________________________________ freenet-tech mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/tech